6. Each preso will have:
1. Title Slide
1. “What it is” Slide
2. News Slides
1. Slide about being safe
1.Citation slide (EasyBib & Evernote)
6 Slides Total
11. Each Person Does One Section
Not
Identity Being
Theft Bullied
Online
12. Each Person Does One Section
Not File Piracy
Identity Being &
Theft Bullied Illegal
Online Downloading
13. Each Person Does One Section
Not File Piracy
Identity Being &
Theft Bullied Illegal
Online Downloading
Safe
Social
Networking
14. Each Person Does One Section
Not File Piracy
Identity Being &
Theft Bullied Illegal
Online Downloading
Safe Filtering
Social Bad
Networking Content
15. Each Person Does One Section
Not File Piracy
Identity Being &
Theft Bullied Illegal
Online Downloading
Safe Filtering School
Social Bad Rules
Networking Content & AUP
16. Each Person Does One Section
Not File Piracy
Identity Being &
Theft Bullied Illegal
Online Downloading
Safe Filtering School
Social Bad Rules
Networking Content & AUP
Bonus if you have 7
people:
17. Each Person Does One Section
Not File Piracy
Identity Being &
Theft Bullied Illegal
Online Downloading
Safe Filtering School
Social Bad Rules
Networking Content & AUP
Bonus if you have 7 Cyberpredators
people:
29. Everything you need is here:
Use only the Following Resources (don't just Google it):
Identity Theft:
Play Antiphishing Phil
http://cups.cs.cmu.edu/antiphishing_phil/new/index.html
Learn what it is:
http://www.commoncraft.com/phishing
http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/about-identity-theft.html
News: http://www.washingtonpost.com/wp-dyn/content/article/2009/08/27/AR2009082702276.html?hpid=sec-business
News: http://www.washingtonpost.com/wp-dyn/content/article/2009/08/28/AR2009082803779.html
Protect yourself:
http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/defend.html
http://tcs.cybertipline.com/knowthedangers8.htm
30. Everything you need is here:
Use only the Following Resources (don't just Google it):
Identity Theft:
Play Antiphishing Phil
http://cups.cs.cmu.edu/antiphishing_phil/new/index.html
Learn what it is:
http://www.commoncraft.com/phishing
http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/about-identity-theft.html
News: http://www.washingtonpost.com/wp-dyn/content/article/2009/08/27/AR2009082702276.html?hpid=sec-business
News: http://www.washingtonpost.com/wp-dyn/content/article/2009/08/28/AR2009082803779.html
Protect yourself:
http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/defend.html
http://tcs.cybertipline.com/knowthedangers8.htm
31. Everything you need is here:
Use only the Following Resources (don't just Google it):
Identity Theft:
Play Antiphishing Phil
http://cups.cs.cmu.edu/antiphishing_phil/new/index.html
Learn what it is:
http://www.commoncraft.com/phishing
http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/about-identity-theft.html
News: http://www.washingtonpost.com/wp-dyn/content/article/2009/08/27/AR2009082702276.html?hpid=sec-business
News: http://www.washingtonpost.com/wp-dyn/content/article/2009/08/28/AR2009082803779.html
Protect yourself:
http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/defend.html
http://tcs.cybertipline.com/knowthedangers8.htm
32. Everything you need is here:
Use only the Following Resources (don't just Google it):
Identity Theft:
Play Antiphishing Phil
http://cups.cs.cmu.edu/antiphishing_phil/new/index.html
Learn what it is:
http://www.commoncraft.com/phishing
http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/about-identity-theft.html
News: http://www.washingtonpost.com/wp-dyn/content/article/2009/08/27/AR2009082702276.html?hpid=sec-business
News: http://www.washingtonpost.com/wp-dyn/content/article/2009/08/28/AR2009082803779.html
Protect yourself:
http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/defend.html
http://tcs.cybertipline.com/knowthedangers8.htm
33. Everything you need is here:
Use only the Following Resources (don't just Google it):
Identity Theft:
Play Antiphishing Phil
http://cups.cs.cmu.edu/antiphishing_phil/new/index.html
Learn what it is:
http://www.commoncraft.com/phishing
http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/about-identity-theft.html
News: http://www.washingtonpost.com/wp-dyn/content/article/2009/08/27/AR2009082702276.html?hpid=sec-business
News: http://www.washingtonpost.com/wp-dyn/content/article/2009/08/28/AR2009082803779.html
Protect yourself:
http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/defend.html
http://tcs.cybertipline.com/knowthedangers8.htm
39. Becomes:
What are Social Networks?
Places to hang out!
Most Social Network Sites are aimed at
teens and young adults
What kids do on
social networks: Disney and Nick.com have services
dedicated for children, like Club Penguin
“about 60% talking about
Sites for young children, under 14, require
education-related topics
moderation and more permissions to sign up
and 50% discussing their
schoolwork”
http://www.digizen.org/socialnetworking/what.aspx
The National School Board Association
research says kids spend 9 hours online a
week, almost as much as TV
46. When?
Sept 22, 23
Get a grade, a lappy and a new lifestyle!
47. Bottom Line:
Group size? _____
How many slides? ____
How much time? ____
How many facts per slide? ____
Who does the research? ____
What preso tool? ____